Product
How to Manage Chainguard IAM Organizations
Using Identity and Access Management in Chainguard
Create an Assumable Identity for an AWS Lambda RoleProcedural tutorial outlining how to create a Chainguard identity that can be assumed by an AWS role.
Create an Assumable Identity to Authenticate from an EC2 InstanceProcedural tutorial outlining how to create a Chainguard identity that can be assumed by an AWS role in EC2 instance.
Using the Chainguard API to Manage Custom Assembly ResourcesHow to use the Chainguard API to manage Custom Assembly resources.
Strategies and Tooling for Updating Container ContainersA conceptual article outlining different strategies and tools for keeping images up to date and avoiding the use of end-of-life software.
Mirror new Containers to Google Artifact Registry with Chainguard CloudEventsInstructional guide outlining how one can set up an application that will listen for push events on a private registry and mirror any new Chainguard Containers to a GCP Artifact Registry.
Debugging Distroless Container Images with Kubectl Debug and CDebugThis video explains how to use the Kubectl and cdebug tools to investigate failing containers. It focuses on how to debug distroless images with no shell where traditional 'exec' commands don't work.